Created on
‎03-24-2025
04:30 AM
Edited on
‎08-15-2025
05:57 AM
By
Stephen_G
Description | This article describes how to configure the FortiGate Firewall to allow iCloud Private Relay. |
Scope | FortiGate. |
Solution |
Go to: 'Policy & Objects' -> 'Firewall Policy' and select 'Create new' to create a new Firewall Policy. Since there is no specific Internet Service for iCloud Private Relay, select all Apple Internet Services as destinations.
After adding the Apple Internet Service, the Firewall Policy will look as below:
Select OK, and the Firewall Policy will be created.
Note: Make sure this policy is on top of other policies for traffic to hit this and allow traffic as required.
Additionally, add a different firewall policy with the list of URLs:
Use this CLI template over the CLI console to create all the relevant address objects, and an address object group "iCloud_PR_group":
config firewall address config firewall policy edit 2 <----- Policy ID. set name "Apple-Private-Relay-Allow" set srcintf "TEST123" set dstintf "wan" <----- Internet facing interface. set action accept set srcaddr all <----- Could be specific internal addresses. set dstaddr "iCloud_PR_group" <----- Should match the address group created above. set schedule "always" set service "ALL" set logtraffic all set nat enable next end
Related article: Technical Tip: How to block iCloud Private Relay from bypassing the Security Inspection |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.